Controlling Access to Ideograms
First Claim
1. A method comprising:
- receiving, from a client device of an author user, a request for a restricted ideogram to be inserted into a message;
accessing social-networking information for the author user stored in association with a social graph of the social-networking system;
determining, based on the social-networking information for the author user, whether the author user is authorized to access the restricted ideogram;
accessing social-networking information for a recipient user stored in association with the social graph of the social-networking system;
determining, based on the social-networking information for the recipient user, whether the recipient user is authorized to access the restricted ideogram; and
if the author user and the recipient user are authorized to access the restricted ideogram, then sending, to the client device of the author user, information to insert the restricted ideogram into the message.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving, from a client device of an author of a message, a request for a restricted ideogram to be inserted into a message; accessing social-networking information for the author; determining, based on the social-networking information for the author, whether the author is authorized to access the restricted ideogram; accessing social-networking information for a recipient user; determining, based on the social-networking information for the recipient user, whether the recipient user is authorized to access the restricted ideogram; and if the author and the recipient user are authorized to access the restricted ideogram, then sending, to the client device of the author, information to insert the restricted ideogram into the message.
25 Citations
20 Claims
-
1. A method comprising:
-
receiving, from a client device of an author user, a request for a restricted ideogram to be inserted into a message; accessing social-networking information for the author user stored in association with a social graph of the social-networking system; determining, based on the social-networking information for the author user, whether the author user is authorized to access the restricted ideogram; accessing social-networking information for a recipient user stored in association with the social graph of the social-networking system; determining, based on the social-networking information for the recipient user, whether the recipient user is authorized to access the restricted ideogram; and if the author user and the recipient user are authorized to access the restricted ideogram, then sending, to the client device of the author user, information to insert the restricted ideogram into the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
receive, from a client device of an author user, a request for a restricted ideogram to be inserted into a message; access social-networking information for the author user stored in association with a social graph of the social-networking system; determine, based on the social-networking information for the author user, whether the author user is authorized to access the restricted ideogram; access social-networking information for a recipient user stored in association with the social graph of the social-networking system; determine, based on the social-networking information for the recipient user, whether the recipient user is authorized to access the restricted ideogram; and if the author user and the recipient user are authorized to access the restricted ideogram, then send, to the client device of the author user, information to insert the restricted ideogram into the message. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; receive, from a client device of an author user, a request for a restricted ideogram to be inserted into a message; access social-networking information for the author user stored in association with a social graph of the social-networking system; determine, based on the social-networking information for the author user, whether the author user is authorized to access the restricted ideogram; access social-networking information for a recipient user stored in association with the social graph of the social-networking system; determine, based on the social-networking information for the recipient user, whether the recipient user is authorized to access the restricted ideogram; and if the author user and the recipient user are authorized to access the restricted ideogram, then send, to the client device of the author user, information to insert the restricted ideogram into the message. - View Dependent Claims (17, 18, 19, 20)
-
Specification